Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Deterioration of Groundwater in Beirut Due to Seawater Intrusion
(Articles)
Mark Saadeh
,
Elie Wakim
Journal of Geoscience and Environment Protection
Vol.5 No.11
,November 17, 2017
DOI:
10.4236/gep.2017.511011
1,358
Downloads
3,870
Views
Citations
Modeling of the Groundwater Flow and Saltwater Intrusion in the Coastal Aquifer of Fum Al Wad, Province of Laayoun, Morocco
(Articles)
Mohamed El Mokhtar
,
Mohamed Chibout
,
Bouabid El Mansouri
,
Jamal Chao
,
Malika Kili
,
Sidi Mokhtar El Kanti
International Journal of Geosciences
Vol.9 No.1
,January 30, 2018
DOI:
10.4236/ijg.2018.91005
1,287
Downloads
4,250
Views
Citations
Investigation of the Source Relationship between Benzene Vapor and Alkylate-Containing Light Non-Aqueous Phase Liquid at Adjacent Industrial Facilities
(Articles)
Frank S. Muramoto
,
Jun Lu
Journal of Environmental Protection
Vol.9 No.5
,May 30, 2018
DOI:
10.4236/jep.2018.95036
664
Downloads
1,426
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,611
Downloads
3,776
Views
Citations
Orthodontic Intrusion of over Erupted Permanent Maxillary Molars Using Temporary Anchorage Devices
(Articles)
Mohammad Jaradat
,
Waddah Arda
Open Journal of Stomatology
Vol.9 No.5
,May 13, 2019
DOI:
10.4236/ojst.2019.95010
1,459
Downloads
4,533
Views
Citations
Baddeleyite from Large Complex Deposits: Significance for Archean-Paleozoic Plume Processes in the Arctic Region (NE Fennoscandian Shield) Based on U-Pb (ID-TIMS) and LA-ICP-MS Data
(Articles)
Tamara Bayanova
,
Viktor Subbotin
,
Svetlana Drogobuzhskaya
,
Anatoliy Nikolaev
,
Ekaterina Steshenko
Open Journal of Geology
Vol.9 No.8
,August 30, 2019
DOI:
10.4236/ojg.2019.98031
596
Downloads
1,365
Views
Citations
Petrography and Mineralogy of the Quartz and Quartz-Feldspar Sulphide Veins in the Pan-African Syenitic Massif of Guider (North Cameroon)
(Articles)
Marguerite Boyabe
,
Daouda Dawai
,
Rigobert Tchameni
,
Periclex Martial Fosso Tchunte
Open Journal of Geology
Vol.10 No.3
,March 20, 2020
DOI:
10.4236/ojg.2020.103013
665
Downloads
2,951
Views
Citations
Pore Structure Characteristics of Taiyuan Formation Shale in Qinshui Basin
(Articles)
Hongyue Duan
,
Wenkai Zhang
,
Xinquan Wang
,
Kaizi Jiang
,
Tingting Huang
Journal of Geoscience and Environment Protection
Vol.8 No.7
,July 27, 2020
DOI:
10.4236/gep.2020.87007
322
Downloads
781
Views
Citations
Hydrogeology of Eastern Niger Delta: A Review
(Articles)
T. K. S. Abam
,
H. O. Nwankwoala
Journal of Water Resource and Protection
Vol.12 No.9
,September 21, 2020
DOI:
10.4236/jwarp.2020.129045
745
Downloads
3,632
Views
Citations
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
(Articles)
Onyekware U. Oluoha
,
Terungwa S. Yange
,
George E. Okereke
,
Francis S. Bakpo
Journal of Information Security
Vol.12 No.4
,September 30, 2021
DOI:
10.4236/jis.2021.124014
493
Downloads
2,667
Views
Citations
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
682
Downloads
10,710
Views
Citations
Modeling of the Saltwater Intrusion Using the Level Set Method. Application to Henry’s Problem
(Articles)
Joachna Meya Loua-Bouayi
,
Christian Tathy
,
Adolphe Kimbonguila Manounou
Computational Water, Energy, and Environmental Engineering
Vol.11 No.1
,January 6, 2022
DOI:
10.4236/cweee.2022.111002
190
Downloads
854
Views
Citations
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
(Articles)
Gbenga Ikuomenisan
,
Yasser Morgan
Journal of Information Security
Vol.13 No.4
,August 23, 2022
DOI:
10.4236/jis.2022.134012
244
Downloads
1,309
Views
Citations
An Activity Recognition System at Home Based on CO
2
Sensors
(Articles)
Hiroyuki Matsubara
Journal of Computer and Communications
Vol.11 No.11
,November 24, 2023
DOI:
10.4236/jcc.2023.1111004
70
Downloads
204
Views
Citations
An Assessment of Saltwater Intrusion in Coastal Regions of Lagos, Nigeria
(Articles)
Obunadike Callistus
,
Akerele D. Daniel
,
Abiodun O. Pelumi
,
Olisah Somtobe
,
Oloyede Kunle
,
Obunadike S. Echezona
,
Obunadike J. Chinenye
Journal of Geoscience and Environment Protection
Vol.12 No.1
,January 25, 2024
DOI:
10.4236/gep.2024.121007
49
Downloads
295
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
816
Downloads
5,220
Views
Citations
New U-Pb and Sm-Nd Data and REE Distribution in Sulphides of Paleoproterozoic PGE Layered Intrusions in the Arctic Part of the Fennoscandian Shield
(Articles)
Tamara Bayanova
,
Irina Elizarova
,
Pavel Serov
,
Nadezhda Ekimova
,
Evgeny Kunakkuzin
,
Ekaterina Steshenko
,
Yury Neradovsky
,
Markku Iljina
,
Dmitry Zhirov
Open Journal of Geology
Vol.9 No.11
,October 10, 2019
DOI:
10.4236/ojg.2019.911089
417
Downloads
1,009
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
128
Downloads
710
Views
Citations
Human cancer is transmitted via genome
(Articles)
Sergey N. Rumyantsev
Open Journal of Genetics
Vol.3 No.1
,March 26, 2013
DOI:
10.4236/ojgen.2013.31002
4,902
Downloads
8,222
Views
Citations
Security: A Core Issue in Mobile
Ad hoc
Networks
(Articles)
Asif Shabbir
,
Fayyaz Khalid
,
Syed Muqsit Shaheed
,
Jalil Abbas
,
M. Zia-Ul-Haq
Journal of Computer and Communications
Vol.3 No.12
,December 9, 2015
DOI:
10.4236/jcc.2015.312005
5,043
Downloads
6,850
Views
Citations
<
...
5
6
7
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top